2.3 - Robust Programs

2.3 - Robust Programs

KG - University

39 Qs

quiz-placeholder

Similar activities

Java Feature

Java Feature

Professional Development

42 Qs

AS-T12-Software development

AS-T12-Software development

11th Grade

37 Qs

Computer Architecture

Computer Architecture

11th - 12th Grade

40 Qs

End of topic test on Network

End of topic test on Network

KG

43 Qs

INTRODUCTION TO SYSTEM FUNDAMENTALS

INTRODUCTION TO SYSTEM FUNDAMENTALS

University

35 Qs

Computer Hardware Assessment

Computer Hardware Assessment

7th Grade

40 Qs

Sistem Komputer Kelas 8

Sistem Komputer Kelas 8

8th Grade

35 Qs

Ujian Tengah Semester Informatika

Ujian Tengah Semester Informatika

10th Grade - University

40 Qs

2.3 - Robust Programs

2.3 - Robust Programs

Assessment

Quiz

Computers

KG - University

Hard

Used 196+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a method for ensuring a program is robust?
Keeping passwords safe
Data Validation
Authentication
Data Sanitisation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data validation?
Checking that the data entered is wrong
Checking that the data entered is correct
Checking that the data entered is sensible or reasonable
Checking that the data has been entered by the correct person

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these authentication methods is most secure?
Password
Password and username
Key Card
Physical and Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is these IS NOT an example of validation
Checking the number entered is 2 digits
Asking a user to enter the same data in twice
Use of a Lookup table
Use of a presence check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 When a program runs it asks the user to enter their full name. Which is an example of Valid data? 
Mr Jones
Sarah
Sarah Jones
Mrs Jones

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a range check do?
Checks data across a range of numbers
Checks the data is within an acceptable range
Where three types of data are used
Checks that the data is in the correct format

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is not a method for planning for misuse?
Limiting the number of login attempts
Requesting a password and user name
Authentication
Not validating the data entry

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?